Q.1 Which of the following is a valid IP address?
192.168.1.1
256.100.50.1
192.168.1.256
123.456.78.90
Explanation - A valid IP address has four octets, each ranging from 0 to 255. 192.168.1.1 satisfies this range.
Correct answer is: 192.168.1.1
Q.2 Which protocol is used to send email?
FTP
SMTP
HTTP
POP3
Explanation - SMTP (Simple Mail Transfer Protocol) is used for sending emails over the Internet.
Correct answer is: SMTP
Q.3 Which type of network is confined to a small area such as a building?
LAN
WAN
MAN
VPN
Explanation - LAN (Local Area Network) connects computers within a small geographical area, like a building or campus.
Correct answer is: LAN
Q.4 What does HTTP stand for?
HyperText Transfer Protocol
Hyperlink Transfer Protocol
HyperText Transmission Protocol
HighText Transfer Protocol
Explanation - HTTP is the foundation of data communication for the World Wide Web.
Correct answer is: HyperText Transfer Protocol
Q.5 Which device is used to connect multiple devices in a network?
Router
Switch
Modem
Firewall
Explanation - A switch connects multiple devices on the same network and allows them to communicate efficiently.
Correct answer is: Switch
Q.6 Which topology has all nodes connected to a central hub?
Star
Ring
Bus
Mesh
Explanation - In a star topology, all nodes are connected to a central hub, which manages data transmission.
Correct answer is: Star
Q.7 Which protocol is commonly used to retrieve emails from a server?
SMTP
POP3
FTP
IMAP
Explanation - POP3 (Post Office Protocol version 3) is used to download emails from a mail server to a local device.
Correct answer is: POP3
Q.8 What is the main purpose of DNS?
To secure data transmission
To translate domain names to IP addresses
To encrypt email
To monitor network traffic
Explanation - DNS (Domain Name System) translates human-readable domain names into machine-readable IP addresses.
Correct answer is: To translate domain names to IP addresses
Q.9 Which of the following is a wireless networking technology?
Ethernet
Wi-Fi
Token Ring
Coaxial Cable
Explanation - Wi-Fi is a wireless networking technology that allows devices to communicate without physical cables.
Correct answer is: Wi-Fi
Q.10 What does VPN stand for?
Virtual Private Network
Virtual Public Network
Very Private Network
Virtual Protected Network
Explanation - A VPN creates a secure, encrypted connection over a less secure network, like the Internet.
Correct answer is: Virtual Private Network
Q.11 Which layer of the OSI model is responsible for logical addressing?
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Explanation - The Network Layer handles logical addressing, routing, and forwarding of data packets.
Correct answer is: Network Layer
Q.12 Which device can connect two different networks?
Switch
Hub
Router
Repeater
Explanation - A router forwards data between different networks and directs traffic based on IP addresses.
Correct answer is: Router
Q.13 Which of the following is an example of a public IP address?
10.0.0.1
172.16.5.4
192.168.1.1
8.8.8.8
Explanation - 8.8.8.8 is a public IP address provided by Google DNS, whereas others are private IP addresses.
Correct answer is: 8.8.8.8
Q.14 Which protocol is used to securely browse websites?
HTTP
HTTPS
FTP
SMTP
Explanation - HTTPS uses SSL/TLS to encrypt HTTP traffic, ensuring secure communication between client and server.
Correct answer is: HTTPS
Q.15 Which of the following is an example of a cloud service provider?
Cisco
Amazon Web Services
Intel
IBM Hardware
Explanation - AWS provides cloud-based computing and storage services accessible over the Internet.
Correct answer is: Amazon Web Services
Q.16 Which device is primarily used to amplify signals in a network?
Switch
Repeater
Router
Hub
Explanation - A repeater regenerates and amplifies signals to extend the transmission distance in a network.
Correct answer is: Repeater
Q.17 What is the range of Bluetooth devices typically?
10 meters
100 meters
1 km
5 km
Explanation - Bluetooth is a short-range wireless technology with a typical range of about 10 meters.
Correct answer is: 10 meters
Q.18 Which layer of the OSI model is responsible for end-to-end communication?
Transport Layer
Network Layer
Session Layer
Data Link Layer
Explanation - The Transport Layer ensures end-to-end communication, reliability, and error recovery in data transmission.
Correct answer is: Transport Layer
Q.19 Which of the following is a malware that can replicate itself and spread to other computers?
Virus
Worm
Trojan
Spyware
Explanation - A worm is a type of malware that can replicate itself without user intervention and spread across networks.
Correct answer is: Worm
Q.20 Which of the following IP addresses is IPv6?
192.168.1.1
2001:0db8:85a3:0000:0000:8a2e:0370:7334
10.0.0.1
172.16.0.1
Explanation - IPv6 addresses are 128-bit and represented in hexadecimal format separated by colons.
Correct answer is: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Q.21 Ping command is used to:
Check network connectivity
Download files
Configure IP addresses
Encrypt data
Explanation - The ping command checks if a device is reachable on a network by sending ICMP echo requests.
Correct answer is: Check network connectivity
Q.22 Which port does HTTPS use by default?
80
443
21
25
Explanation - HTTPS uses port 443 for secure communication, while HTTP uses port 80.
Correct answer is: 443
Q.23 Which of the following is a network security device?
Router
Switch
Firewall
Repeater
Explanation - A firewall monitors and controls incoming and outgoing network traffic based on security rules.
Correct answer is: Firewall
Q.24 Which protocol is used for transferring files over the Internet?
FTP
SMTP
DNS
HTTP
Explanation - FTP (File Transfer Protocol) is used to transfer files between client and server over a network.
Correct answer is: FTP
